100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CYBER AWARENESS EXAM QUESTIONS AND ANSWERS (100% CORRECT)

Rating
-
Sold
-
Pages
2
Grade
A+
Uploaded on
12-11-2024
Written in
2024/2025

CYBER AWARENESS EXAM QUESTIONS AND ANSWERS (100% CORRECT) Which of the following is true of spillage? - Answers It refers specifically to classified information that becomes publicly available. Which of the following is a risk associated with removable media? - Answers All of these How can an adversary use information available in public records to target you? - Answers Combine it with information from other data sources to learn how best to bait you with a scam Which best describes an insider threat? Someone who uses _______ access, _______, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions. - Answers authorized; wittingly or unwittingly Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions? - Answers CPCON 2 Sylvia commutes to work via public transportation. She often uses the time to get a head start on work by making phone calls or responding to e-mails on her government approved mobile device. Does this pose a security concern? - Answers Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Sylvia should be aware of these risks. Which of the following is true of Sensitive Compartmented Information Facilities (SCIFs)? - Answers Personnel must position monitors so that they do not face windows or close the window blinds. Which of the following is an example of behavior that uou should report? - Answers Taking sensitive information home for teleowrk without authorization Which of the following is an example of a good password? - Answers d+Uf_4RimUz How should government owned removable media be stored? - Answers In a GSA-approved container according to the appropriate security classification On your home computer, how can you best establish passwords when creating separate user accounts? - Answers Have each user create their own, strong password Which of the following personally owned peripherals can you use with government furnished equipment? - Answers A Bluetooth headset How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, ) - Answers Use the preview function to see where the link actually leads Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk? - Answers Yes, there is a risk that the signal could be intercepted or altered.

Show more Read less
Institution
CYBER AWARENESS
Course
CYBER AWARENESS








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CYBER AWARENESS
Course
CYBER AWARENESS

Document information

Uploaded on
November 12, 2024
Number of pages
2
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CYBER AWARENESS EXAM QUESTIONS AND ANSWERS (100% CORRECT)

Which of the following is true of spillage? - Answers It refers specifically to classified information that
becomes publicly available.

Which of the following is a risk associated with removable media? - Answers All of these

How can an adversary use information available in public records to target you? - Answers Combine it
with information from other data sources to learn how best to bait you with a scam

Which best describes an insider threat? Someone who uses _______ access, _______, to harm national
security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions. -
Answers authorized; wittingly or unwittingly

Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and
essential functions? - Answers CPCON 2

Sylvia commutes to work via public transportation. She often uses the time to get a head start on work
by making phone calls or responding to e-mails on her government approved mobile device. Does this
pose a security concern? - Answers Yes. Eavesdroppers may be listening to Sylvia's phone calls, and
shoulder surfers may be looking at her screen. Sylvia should be aware of these risks.

Which of the following is true of Sensitive Compartmented Information Facilities (SCIFs)? - Answers
Personnel must position monitors so that they do not face windows or close the window blinds.

Which of the following is an example of behavior that uou should report? - Answers Taking sensitive
information home for teleowrk without authorization

Which of the following is an example of a good password? - Answers d+Uf_4RimUz

How should government owned removable media be stored? - Answers In a GSA-approved container
according to the appropriate security classification

On your home computer, how can you best establish passwords when creating separate user accounts?
- Answers Have each user create their own, strong password

Which of the following personally owned peripherals can you use with government furnished
equipment? - Answers A Bluetooth headset

How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, goo.gl) -
Answers Use the preview function to see where the link actually leads

Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk? -
Answers Yes, there is a risk that the signal could be intercepted or altered.

Which of the following is true of telework? - Answers You must have permission from your organization
to telework
R143,27
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Document also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
342
Member since
1 year
Number of followers
16
Documents
28610
Last sold
2 days ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3,6

53 reviews

5
18
4
14
3
12
2
0
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions